Blogs | AlienVault
The AlienVault Blogs: Taking On Today’s Threats

The most recent posts from across the AlienVault blogs.

Subscribe: Via Email | RSS


Late-breaking discoveries and in-depth analysis.

Subscribe: Via Email | RSS


Practical, how-to advice, tips and guidance.

Subscribe: Via Email | RSS

AlienVault is releasing another major new feature called Private Groups in Open Threat Exchange (OTX) today. This new feature allows users within OTX to create a private group of other OTX users and control access to the threat data shared within that group. Threat data contained within the private group stays in the private group and is not shared more… Read more

Tags: otx

Nothing can make your heart drop to your stomach like discovering your network has been breached. It's a horrible situation to find yourself in, but with a little forethought and some simple steps, you can minimize the damage to your company and your career.A key task to complete before you suffer a system compromise is to prepare an… Read more

Tags: security breach, incidence response

A roundup of the week’s news, commentary, and observations.Pokemon Go has been all over the news this week, with initial reports of the app obtaining excessive permission, to reports of people being injured, or mugged by luring unsuspecting users.But this isn’t a new problem, simply a repackaging. Mobile apps are notorious for requesting excessive… Read more


There is also a printable PDF version of the case study.Founded in 1893, the University of Wisconsin–Superior (UW-Superior) is a public university located in Superior, Wisconsin. UW–Superior grants bachelor’s, master’s, and specialist’s degrees. The university currently enrolls about 2,450 undergraduates and 150 graduate students from over 40 different countries. Ranked as 23rd by… Read more

Tags: siem, ids, usm, case study

Firewalls. We all have them. We all know we use them to keep unwanted stuff out of our networks. One thing we sometimes don’t think about is to whom our systems inside the network are talking.Why should we be concerned with what connections are being made from within our networks to the outside world? Data exfiltration, (malware… Read more

Tags: usm, firewall

Get Email Updates

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content